Also found in: Dictionary, Thesaurus, Legal, Financial, Wikipedia.


Virus software that blackmails users by encrypting their hard drives or locking them out of the computer. It then demands payment to restore it. A favorite ploy is an FBI message claiming the user has child pornography on the computer, and a fine must be paid or else risk arrest. After paying the blackmail on any of these ransomware attacks, the user's machine may or may not be restored. Also known as a "cryptovirus" or "cryptotrojan."

In 2013, the creators of CryptoLocker collected millions in ransom by infecting Windows PCs until its distribution was halted a year later by the FBI and Interpol. CryptoLocker was the inspiration for other ransomware variants (gotta love that entrepreneurial spirit!).

Mobile Phones Too
In 2014, using the same FBI scare tactic, thousands of Android users found their phones locked with demands for payment. See scareware and wares.

FBI MoneyPak Ransomware
Imagine finding your computer frozen with an FBI alert saying you violated any one or more of video, music or software copyrights or you distributed child pornography. It demands that you put USD $200 cash into a MoneyPak card and enter the card number within 72 hours to unlock your computer and prevent the initiation of a criminal case.
References in periodicals archive ?
Today's persistent cybercriminals are deploying multiple attack methods to succeed, whether using a mix of ransomware in a single campaign, taking advantage of a remote access opportunity, infecting a server, or disabling security software.
In fact, Wisniewski reveals there are ransomware variants on the Dark Web delivered via cloud that offer a host of menu options to guide crooks on how much ransom to charge and the distribution spectrum of the attack.
One of the key developments in the ransomware space was the emergence of Lukitus, a new version of Locky ransomware.
Ransomware took an evolutionary jump in May 2017 with WannaCry that was allegedly created by the U.
Instead, Holly believes that businesses need to focus on encouraging positive user practices, while combining this with a well-maintained network that is set up to proactively guard against ransomware threats.
Controlled Folder Access won't slow down the growth of ransomware until it's active on most computers.
Clicking on such attachments can launch a ransomware program.
When combined with its existing ransomware prevention and other multi-method prevention capabilities, Traps offers effective ransomware protection and helps organizations avoid the business productivity losses associated with inaccessible data.
Cyberattacks using ransomware to undermine patient safety and privacy is the stuff that keeps health care executives awake at night.
Commenting on the severity of ransomware, Matthew Gyde,
The VBS file contains a downloader which polls to domain "greatesthits[dot]mygoldmusic[dot]com" (please do not visit this malicious website) to download variants of Locky ransomware.
As per the information reported to the Indian Computer Emergency Response Team (CERTIn), a total of 65 incidents involving ransomware were reported between 2014 and 2017 till June, he said in the Lok Sabha.